Skip to content

Commit d842ed8

Browse files
authored
Merge branch 'main' into diannegali-updatesirm
2 parents c2bd287 + e3ca63a commit d842ed8

File tree

63 files changed

+736
-169
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

63 files changed

+736
-169
lines changed
-43.2 KB
Binary file not shown.

ATPDocs/deploy/active-directory-federation-services.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -55,9 +55,6 @@ Configure the SQL server to allow the Directory Service Account with the followi
5555
- *read*
5656
- *select*
5757

58-
> [!NOTE]
59-
> If the AD FS database runs on a dedicated SQL server instead of the local AD FS server, and you're using a group Managed Service Account (gMSA) as the Directory Service Account, make sure that you grant the SQL server the [required permissions](create-directory-service-account-gmsa.md#prerequisites-grant-permissions-to-retrieve-the-gmsa-accounts-password) to retrieve the gMSA's password.
60-
6158
### Grant access to the AD FS database
6259

6360
Grant access to the AD FS database by using SQL Server Management Studio, Transact-SQL (T-SQL), or PowerShell.

ATPDocs/privacy-compliance.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -22,13 +22,14 @@ For more information see: [Microsoft Defender for Identity monitored activities]
2222

2323
Defender for Identity operates in the Microsoft Azure data centers in the following locations:
2424

25-
- European Union (West Europe, North Europe)
26-
- United Kingdom (UK South)
27-
- United States (East US, West US, West US2)
28-
- Australia (Australia East)
29-
- Switzerland (Switzerland North)
30-
- Singapore (Southeast Asia)
25+
- Asia (Southeast Asia)
26+
- Australia (Australia East, Australia Southeast)
27+
- Europe (West Europe, North Europe)
3128
- India (Central India, South India)
29+
- North America (East US, West US, West US2)
30+
- Switzerland (Switzerland North, Switzerland West)
31+
- United Kingdom (UK South)
32+
3233

3334
Customer data collected by the service might be stored as follows:
3435

CloudAppSecurityDocs/protect-docusign.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,8 @@ ms.topic: how-to
77

88
# How Defender for Cloud Apps helps protect your DocuSign environment
99

10-
10+
> [!NOTE]
11+
> The DocuSign App Connector requires an active, paid DocuSign and DocuSign Monitor subscription to access and retrieve events.
1112
1213
DocuSign helps organizations manage electronic agreements, and so your DocuSign environment holds sensitive information for your organization. Any abuse of DocuSign by a malicious actor or any human error may expose your most critical assets to potential attacks.
1314

@@ -136,4 +137,4 @@ This section provides instructions for connecting Microsoft Defender for Cloud A
136137
> [!div class="nextstepaction"]
137138
> [Control cloud apps by using policies](control-cloud-apps-with-policies.md)
138139
139-
[!INCLUDE [Open support ticket](includes/support.md)]
140+
[!INCLUDE [Open support ticket](includes/support.md)]

defender-endpoint/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -261,7 +261,7 @@
261261
items:
262262
- name: Defender for Endpoint on Linux for ARM64-based devices (preview)
263263
href: mde-linux-arm.md
264-
- name: Installer script
264+
- name: Installer script based deployment
265265
href: linux-installer-script.md
266266
- name: Ansible based deployment
267267
href: linux-install-with-ansible.md

defender-endpoint/assign-portal-access.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ ms.collection:
1313
- m365-security
1414
- tier2
1515
ms.topic: conceptual
16-
ms.date: 06/25/2024
16+
ms.date: 01/28/2025
1717
---
1818

1919
# Assign user access
@@ -36,18 +36,22 @@ Defender for Endpoint supports two ways to manage permissions:
3636

3737
- **Role-based access control (RBAC)**: Set granular permissions by defining roles, assigning Microsoft Entra user groups to the roles, and granting the user groups access to device groups. For more information on RBAC, see [Manage portal access using role-based access control](rbac.md).
3838

39+
> [!IMPORTANT]
40+
> Starting February 16, 2025, new Microsoft Defender for Endpoint customers will only have access to the Unified Role-Based Access Control (URBAC).
41+
> Existing customers keep their current roles and permissions. For more information, see URBAC [Unified Role-Based Access Control (URBAC) for Microsoft Defender for Endpoint](/defender-xdr/manage-rbac).
42+
3943
## Change from basic permissions to RBAC
4044

41-
If you have already assigned basic permissions, you can switch to RBAC anytime. Consider the following before making the switch:
45+
If you have basic permissions, you can switch to RBAC anytime. Consider the following before making the switch:
4246

43-
- Users who have full access (users who are assigned either the Global Administrator or Security Administrator directory role in Microsoft Entra ID) are automatically assigned the default Defender for Endpoint administrator role, which also has full access.
47+
- Users who have full access are automatically assigned the default Defender for Endpoint administrator role.
4448
- Other Microsoft Entra user groups can be assigned to the Defender for Endpoint administrator role after switching to RBAC.
4549
- Only users who are assigned the Defender for Endpoint administrator role can manage permissions using RBAC.
46-
- Users who have read-only access (Security Readers) lose access to the portal until they are assigned a role. Only Microsoft Entra user groups can be assigned a role under RBAC.
50+
- Users who have read-only access (Security Readers) lose access to the portal until they're assigned a role. Only Microsoft Entra user groups can be assigned a role under RBAC.
4751
- After switching to RBAC, you can't switch back to using basic permissions management.
4852

4953
> [!IMPORTANT]
50-
> Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
54+
> Microsoft recommends that you use roles with the fewest permissions as it helps improve security for your organization. Global Administrator is a highly privileged role that should be limited to emergency scenarios when you can't use an existing role.
5155
5256
## Related articles
5357

defender-endpoint/defender-endpoint-plan-1.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,15 +2,15 @@
22
title: Overview of Microsoft Defender for Endpoint Plan 1
33
description: Get an overview of Defender for Endpoint Plan 1. Learn about the features and capabilities included in this endpoint protection subscription.
44
search.appverid: MET150
5-
author: denisebmsft
6-
ms.author: deniseb
5+
author: emmwalshh
6+
ms.author: ewalsh
77
manager: deniseb
88
audience: ITPro
99
ms.topic: overview
1010
ms.service: defender-endpoint
1111
ms.subservice: onboard
1212
ms.localizationpriority: medium
13-
ms.date: 02/04/2025
13+
ms.date: 02/13/2025
1414
ms.reviewer: shlomiakirav
1515
f1.keywords: NOCSH
1616
ms.collection:
@@ -170,6 +170,10 @@ Using role-based access control (RBAC), your security administrator can create r
170170

171171
To learn more, see [Manage portal access using role-based access control](rbac.md).
172172

173+
> [!IMPORTANT]
174+
> Starting February 16, 2025, new Microsoft Defender for Endpoint customers will only have access to the Unified Role-Based Access Control (URBAC).
175+
> Existing customers keep their current roles and permissions. For more information, see URBAC [Unified Role-Based Access Control (URBAC) for Microsoft Defender for Endpoint](/defender-xdr/manage-rbac)
176+
173177
### Reporting
174178

175179
The Microsoft Defender portal ([https://security.microsoft.com](https://security.microsoft.com)) provides easy access to information about detected threats and actions to address those threats.

defender-endpoint/defender-endpoint-trial-user-guide.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -73,6 +73,10 @@ To make sure your Defender for Endpoint subscription is properly provisioned, yo
7373

7474
## Step 2: Set up role-based access control and grant permissions to your security team
7575

76+
> [!IMPORTANT]
77+
> Starting February 16, 2025, new Microsoft Defender for Endpoint customers will only have access to the Unified Role-Based Access Control (URBAC).
78+
> Existing customers keep their current roles and permissions. For more information, see URBAC [Unified Role-Based Access Control (URBAC) for Microsoft Defender for Endpoint](/defender-xdr/manage-rbac)
79+
7680
Microsoft recommends using the concept of least privileges. Defender for Endpoint uses built-in roles within Microsoft Entra ID. [Review the different roles that are available](/azure/active-directory/roles/permissions-reference) and choose appropriate roles for your security team. Some roles might need to be applied temporarily and removed after the trial is finished.
7781

7882
Use [Privileged Identity Management](/azure/active-directory/active-directory-privileged-identity-management-configure) to manage your roles to provide extra auditing, control, and access review for users with directory permissions.

0 commit comments

Comments
 (0)